Skip to content

Commit b0134f4

Browse files
authored
Merge branch 'main' into patch-71
2 parents 81eaa59 + 2196732 commit b0134f4

File tree

717 files changed

+12771
-4775
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

717 files changed

+12771
-4775
lines changed

.openpublishing.publish.config.json

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -997,7 +997,13 @@
997997
"url": "https://github.com/MicrosoftGraph/microsoft-graph-docs",
998998
"branch": "main",
999999
"branch_mapping": {}
1000-
}
1000+
},
1001+
{
1002+
"path_to_root": "azure-actions-workflow-samples",
1003+
"url": "https://github.com/Azure/actions-workflow-samples",
1004+
"branch": "main",
1005+
"branch_mapping": {}
1006+
}
10011007
],
10021008
"branch_target_mapping": {
10031009
"live": ["Publish", "PDF"],

.openpublishing.redirection.json

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22758,6 +22758,26 @@
2275822758
"source_path_from_root": "/articles/azure-functions/functions-create-function-linux-custom-image.md",
2275922759
"redirect_url": "/azure/azure-functions/functions-how-to-custom-container",
2276022760
"redirect_document_id": false
22761+
},
22762+
{
22763+
"source_path_from_root": "/articles/sentinel/data-connectors/windows-firewall-events-via-ama.md",
22764+
"redirect_url": "/azure/sentinel/data-connectors-reference",
22765+
"redirect_document_id": false
22766+
},
22767+
{
22768+
"source_path_from_root": "/articles/sentinel/data-connectors/cisco-meraki.md",
22769+
"redirect_url": "/azure/sentinel/data-connectors-reference",
22770+
"redirect_document_id": false
22771+
},
22772+
{
22773+
"source_path_from_root": "/articles/sentinel/data-connectors/cisco-asa-ftd-via-ama.md",
22774+
"redirect_url": "/azure/sentinel/data-connectors-reference",
22775+
"redirect_document_id": false
22776+
},
22777+
{
22778+
"source_path_from_root": "/articles/sentinel/data-connectors/threat-intelligence-upload-indicators-api.md",
22779+
"redirect_url": "/azure/sentinel/data-connectors-reference",
22780+
"redirect_document_id": false
2276122781
}
2276222782
]
2276322783
}

articles/active-directory-b2c/faq.yml

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ metadata:
88
ms.service: active-directory
99
ms.workload: identity
1010
ms.topic: faq
11-
ms.date: 03/15/2023
11+
ms.date: 05/23/2023
1212
ms.author: godonnell
1313
ms.subservice: B2C
1414
ms.custom: "b2c-support"
@@ -17,6 +17,20 @@ summary: This page answers frequently asked questions about the Azure Active Dir
1717

1818

1919
sections:
20+
- name: Microsoft Entra External ID preview
21+
questions:
22+
- question: |
23+
What is Microsoft Entra External ID?
24+
answer: |
25+
We announced early preview of our next generation Microsoft Entra External ID solution. This early preview represents an evolutionary step in unifying secure and engaging experiences across all external identities including partners, customers, citizens, patients, and others within a single, integrated platform. For more information about the preview, see [What is Microsoft Entra External ID for customers?](../active-directory/external-identities/customers/overview-customers-ciam.md).
26+
- question: |
27+
How does this preview affect me?
28+
answer: |
29+
No action is required on your part at this time. The next generation platform is currently in early preview only. We remain fully committed to support of your current Azure AD B2C solution. There are no requirements for Azure AD B2C customers to migrate at this time and no plans to discontinue the current Azure AD B2C service. As the next generation platform approaches GA, details will be made available to all our valued B2C customers on available options including migration to the new platform.
30+
- question: |
31+
How do I participate in the preview?
32+
answer: |
33+
As the next generation platform represents our future for customer identity and access management (CIAM), we welcome and encourage your participation and feedback during early preview. If you're interested in joining the early preview, contact your sales team for details.
2034
- name: General
2135
questions:
2236
- question: |
@@ -164,7 +178,7 @@ sections:
164178
If the TOTP authenticator app codes aren't working with your Android or iPhone mobile phone or device, your device's clock time might be incorrect. In your device's settings, select the option to use the network-provided time or to set the time automatically.
165179
166180
- question: |
167-
How do I know that the Go-Local add-on available in my country/region?
181+
How do I know that the Go-Local add-on is available in my country/region?
168182
answer: |
169183
While [creating your Azure AD B2C tenant](tutorial-create-tenant.md), if the Go-Local add-on is available in your country, you're asked to enable it if you need it.
170184

articles/active-directory/develop/tutorial-v2-android.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,6 @@ In this tutorial:
3535

3636
- [Android Studio](https://developer.android.com/studio)
3737
- [Android documentation on generating a key](https://developer.android.com/studio/publish/app-signing#generate-key)
38-
- [Layout resource](https://developer.android.com/guide/topics/resources/layout-resource)
3938

4039
## How this tutorial works
4140

articles/active-directory/devices/azuread-join-sso.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,8 @@ Azure AD Connect or Azure AD Connect cloud sync synchronize your on-premises ide
4242
> Additional configuration is required when passwordless authentication to Azure AD joined devices is used.
4343
>
4444
> For FIDO2 security key based passwordless authentication and Windows Hello for Business Hybrid Cloud Trust, see [Enable passwordless security key sign-in to on-premises resources with Azure Active Directory](../authentication/howto-authentication-passwordless-security-key-on-premises.md).
45+
>
46+
> For Windows Hello for Business Cloud Kerberos Trust, see [Configure and provision Windows Hello for Business - cloud Kerberos trust](/windows/security/identity-protection/hello-for-business/hello-hybrid-cloud-kerberos-trust-provision).
4547
>
4648
> For Windows Hello for Business Hybrid Key Trust, see [Configure Azure AD joined devices for On-premises Single-Sign On using Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base).
4749
>
Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
---
2+
title: Tenant management with Azure REST API
3+
description: Learn how to manage your Azure AD for customers tenant by calling the Azure REST API.
4+
services: active-directory
5+
author: garrodonnell
6+
manager: celested
7+
ms.author: godonnell
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ms.subservice: ciam
11+
ms.topic: how-to
12+
ms.date: 05/23/2023
13+
ms.custom: developer
14+
15+
#Customer intent: As a dev, devops, I want to learn how to use the Azure REST API to manage my Azure AD for customers tenant.
16+
---
17+
18+
# Manage Azure Active Directory for customers tenant with Azure REST API
19+
You can manage your Azure Active Directory for your tenant using the Azure REST API. The management of resources related to tenant management supports the following API operations. Each link in the following sections targets the corresponding page within the Microsoft Graph API reference for that operation.
20+
21+
## Tenant Management operations
22+
23+
You can perform tenant management operations with your Azure Active Directory for customers tenant with the following operations:
24+
25+
- [Create or Update](/rest/api/azurestack/directory-tenants/create-or-update)
26+
- [Delete](/rest/api/azurestack/directory-tenants/delete)
27+
- [Get](/rest/api/azurestack/directory-tenants/get)
28+
- [List](/rest/api/azurestack/directory-tenants/list)
29+
30+
## Next steps
31+
32+
- To learn more about programmatic management, see [Microsoft Graph overview](/graph/overview).
Lines changed: 72 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,72 @@
1+
---
2+
title: Frequently asked questions
3+
description: Find answers to some of the most frequently asked questions about Microsoft Entra External ID for customers, also known as Azure Active Directory (Azure AD) for customers.
4+
services: active-directory
5+
author: msmimart
6+
manager: celestedg
7+
ms.service: active-directory
8+
ms.workload: identity
9+
ms.subservice: ciam
10+
ms.topic: reference
11+
ms.date: 05/23/2023
12+
ms.author: mimart
13+
ms.custom: it-pro
14+
---
15+
16+
# Microsoft Entra External ID for customers frequently asked questions
17+
18+
This article answers frequently asked questions about Microsoft Entra External ID for customers, also known as Azure Active Directory (Azure AD) for customers. This document offers guidance to help customers better understand Microsoft’s current external identities capabilities and the journey for our next generation platform (Microsoft Entra External ID).
19+
20+
This FAQ references customer identity and access management (CIAM). CIAM is an industry recognized category that covers solutions that manage identity, authentication, and authorization for external identity use cases (partners, customers, and citizens). Common functionality includes self-service capabilities, adaptive access, single sign-on (SSO), and bring your own identity (BYOI).
21+
22+
## Frequently asked questions
23+
24+
### What is Microsoft Entra External ID?
25+
26+
Microsoft Entra External ID is our next generation CIAM platform that represents an evolutionary step in unifying secure and engaging experiences across all external identities including customers, partners, citizens, and others, within a single, integrated platform.
27+
28+
### Is Microsoft Entra External ID a new name for Azure AD B2C?
29+
30+
No, this isn't a new name for Azure AD B2C. Microsoft Entra External ID builds on the success of our existing Azure AD B2C technologies but represents our future for CIAM. The new platform serves as the foundation for rapid innovation, features, and capabilities that address use cases across all external users.
31+
32+
### What is the release date for Microsoft Entra External ID?
33+
34+
Microsoft Entra External ID (for customers) entered preview at Microsoft Build 2023. The existing B2B collaboration feature remains unchanged.
35+
36+
### What is the pricing for Microsoft Entra External ID?
37+
38+
Microsoft Entra External ID (for customers) is in preview, so no pricing details are available at this time. The pricing for existing B2B collaboration features is unchanged.
39+
40+
### How does Microsoft Entra External ID affect B2B collaboration?
41+
42+
There are no changes to the existing B2B collaboration features or related pricing. Upon general availability, Microsoft Entra External ID will address use cases across all external user identities, including partners, customers, citizens, and others.
43+
44+
### How long will you support the current Azure AD B2C platform?
45+
46+
We remain fully committed to support of the current Azure AD B2C product. The SLA remains unchanged, and we’ll continue investments in the product to ensure security, availability, and reliability. For existing Azure AD B2C customers that have an interest in moving to the next generation platform, more details will be made available after general availability.
47+
48+
### I have many investments tied up in Azure AD B2C, both in code artifacts and CI/CD pipelines. Do I need to plan for a migration or some other effort?
49+
50+
We recognize the large investments in building and managing custom policies. We’ve listened to many customers who, like you, have shared that custom policies are too hard to build and manage. Our next generation platform will resolve the need for intricate custom policies. In addition to many other platform and feature improvements, you’ll have equivalent functionality in the new platform but a much easier way to build and manage it. We expect to share migration options closer to general availability of the next generation platform.
51+
52+
### I’ve heard I can preview the Microsoft Entra External ID platform. Where can I learn more?
53+
54+
You can learn more about the preview and the features we're delivering on the new platform by visiting the Microsoft Entra External ID for customers [developer center](https://aka.ms/ciam/dev).
55+
56+
### As a new customer, which solution is a better fit, Azure AD B2C or Microsoft Entra External ID (preview)?
57+
58+
Opt for the current Azure AD B2C product if:
59+
60+
- You have an immediate need to deploy a production ready build for customer-facing apps.
61+
62+
> [!NOTE]
63+
> Keep in mind that the next generation Microsoft Entra External ID platform represents the future of CIAM for Microsoft, and rapid innovation, new features and capabilities will be focused on this platform. By choosing the next generation platform from the start, you will receive the benefits of rapid innovation and a future-proof architecture.
64+
65+
Opt for the next generation Microsoft Entra External ID platform if:
66+
67+
- You’re starting fresh building identities into apps or you're in the early stages of product discovery.
68+
- The benefits of rapid innovation, new features and capabilities are a priority.
69+
70+
## Next steps
71+
72+
[Learn more about Microsoft Entra External ID for customers](index.yml)
Lines changed: 119 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,119 @@
1+
---
2+
title: Management APIs for Azure Active Directory for customers
3+
description: Learn how to manage resources in an Azure AD for customers tenant programmatically by using APIs.
4+
services: active-directory
5+
author: garrodonnell
6+
manager: celested
7+
ms.author: godonnell
8+
ms.service: active-directory
9+
ms.workload: identity
10+
ms.subservice: ciam
11+
ms.topic: how-to
12+
ms.date: 05/23/2023
13+
ms.custom: developer
14+
15+
#Customer intent: As a dev, devops, I want to learn how to programmatically manage my Azure Active Directory for customers tenant using APIs.
16+
---
17+
# Management APIs for Azure Active Directory for customers
18+
19+
Using APIs allows you to programmatically manage resources in your Azure Active Directory (AD) for customers directory. Depending on the resource you want to manage, you can use the Microsoft Graph API or the Azure REST API. Both APIs are supported for the management of resources related to Azure AD for customers. Each link in the following sections targets the corresponding page within the relevant reference for that operation. You can use this article to determine which API to use for the resource you want to manage.
20+
21+
## Azure REST API
22+
Using the Azure REST API, you can manage your Azure AD for customers tenant. The following Azure REST API operations are supported for the management of resources related to Azure AD for customers.
23+
24+
* [Tenant Management operations](azure-rest-api-operations-tenant-management.md)
25+
26+
## Microsoft Graph API
27+
28+
Querying and managing resources in your Azure AD for customers directory is done through the Microsoft Graph API. The following Microsoft Graph API operations are supported for the management of resources related to Azure AD for customers.
29+
30+
* [User flows operations](microsoft-graph-operations-user-flow.md)
31+
32+
* [Company branding operations](microsoft-graph-operations-branding.md)
33+
34+
* [Custom extensions](microsoft-graph-operations-custom-extensions.md)
35+
36+
### Register a Microsoft Graph API application
37+
38+
In order to use the Microsoft Graph API, you need to register an application in your Azure AD for customers tenant. This application will be used to authenticate and authorize your application to call the Microsoft Graph API.
39+
40+
During registration, you'll specify a **Redirect URI** which redirects the user after authentication with Azure Active Directory. The app registration process also generates a unique identifier known as an **Application (client) ID**.
41+
42+
The following steps show you how to register your app in the Microsoft Entra admin center:
43+
44+
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com/).
45+
46+
1. If you have access to multiple tenants, make sure you use the directory that contains your Azure AD for customers tenant:
47+
48+
1. Select the **Directories + subscriptions** icon in the portal toolbar.
49+
50+
1. On the **Portal settings | Directories + subscriptions** page, find your Azure AD for customers directory in the **Directory name** list, and then select **Switch**.
51+
52+
1. On the sidebar menu, select **Azure Active Directory**.
53+
54+
1. Select **Applications**, then select **App Registrations**.
55+
56+
1. Select **+ New registration**.
57+
58+
1. In the **Register an application page** that appears, enter your application's registration information:
59+
60+
1. In the **Name** section, enter a meaningful application name that will be displayed to users of the app, for example *ciam-client-app*.
61+
62+
1. Under **Supported account types**, select **Accounts in this organizational directory only**.
63+
64+
1. Select **Register**.
65+
66+
1. The application's **Overview pane** is displayed when registration is complete. Record the **Directory (tenant) ID** and the **Application (client) ID** to be used in your application source code.
67+
68+
### Grant API Access to your application
69+
70+
For your application to access data in Microsoft Graph API, grant the registered application the relevant application permissions. The effective permissions of your application are the full level of privileges implied by the permission. For example, to create, read, update, and delete every user in your Azure AD for customers tenant, add the User.ReadWrite.All permission.
71+
72+
1. Under **Manage**, select **API permissions**.
73+
74+
1. Under **Configured permissions**, select **Add a permission**.
75+
76+
1. Select the **Microsoft APIs** tab, then select **Microsoft Graph**.
77+
78+
1. Select **Application permissions**.
79+
80+
1. Expand the appropriate permission group and select the check box of the permission to grant to your management application. For example:
81+
82+
* **User** > **User.ReadWrite.All**: For user migration or user management scenarios.
83+
84+
* **Group** > **Group.ReadWrite.All**: For creating groups, read and update group memberships, and delete groups.
85+
86+
* **AuditLog** > **AuditLog.Read.All**: For reading the directory's audit logs.
87+
88+
* **Policy** > **Policy.ReadWrite.TrustFramework**: For continuous integration/continuous delivery (CI/CD) scenarios. For example, custom policy deployment with Azure Pipelines.
89+
90+
1. Select **Add permissions**. As directed, wait a few minutes before proceeding to the next step.
91+
92+
1. Select **Grant admin consent for (your tenant name)**.
93+
94+
1. If you are not currently signed-in with Global Administrator account, sign in with an account in your Azure AD for customers tenant that's been assigned at least the *Cloud application administrator* role and then select **Grant admin consent for (your tenant name)**.
95+
96+
1. Select **Refresh**, and then verify that "Granted for ..." appears under **Status**. It might take a few minutes for the permissions to propagate.
97+
98+
After you have registered your application, you need to add a client secret to your application. This client secret will be used to authenticate your application to call the Microsoft Graph API.
99+
100+
The application uses the client secret to prove its identity when it requests for tokens.
101+
102+
1. From the **App registrations** page, select the application that you created (such as *ciam-client-app*) to open its **Overview** page.
103+
104+
1. Under **Manage**, select **Certificates & secrets**.
105+
106+
1. Select **New client secret**.
107+
108+
1. In the **Description** box, enter a description for the client secret (for example, `ciam app client secret`).
109+
110+
1. Under **Expires**, select a duration for which the secret is valid (per your organizations security rules), and then select **Add**.
111+
112+
1. Record the secret's **Value**. You'll use this value for configuration in a later step.
113+
114+
> [!NOTE]
115+
> The secret value won't be displayed again, and is not retrievable by any means, after you navigate away from the certificates and secrets page, so make sure you record it. <br> For enhanced security, consider using **certificates** instead of client secrets.
116+
## Next steps
117+
118+
- To learn more about the Microsoft Graph API, see [Microsoft Graph overview](/graph/overview).
119+

articles/active-directory/external-identities/customers/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,8 @@ landingContent:
2222
links:
2323
- text: About Azure AD for customers
2424
url: overview-customers-ciam.md
25+
- text: Frequently asked questions
26+
url: faq-customers.md
2527
- linkListType: concept
2628
links:
2729
- text: Planning for customer identity and access management

0 commit comments

Comments
 (0)